Results
|
|
1.
|
|
Image from Amazon.com
|
|
|
|
2.
|
|
Image from Amazon.com
|
Applied cryptography: protocols, algorithms, and source code in C by
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York John Wiley & Sons 1996
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) N6.
star rating
Average : 0.0 out of 5 stars
|
|
|
3.
|
|
Image from Amazon.com
|
|
|
|
4.
|
|
Image from Amazon.com
|
|
|
|
5.
|
|
Image from Amazon.com
|
Information security by
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Jersey John Wiley 2011
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q1 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
6.
|
|
Image from Amazon.com
|
|
|
|
7.
|
|
Image from Amazon.com
|
|
|
|
8.
|
|
Image from Amazon.com
|
Mark stamp's information security : principles and practice by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Delhi John Wiley 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P9-;1.
star rating
Average : 0.0 out of 5 stars
|
|
|
9.
|
|
Image from Amazon.com
|
Mark stamp's information security : principles and practice by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Delhi John Wiley 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P9-;1.
star rating
Average : 0.0 out of 5 stars
|
|
|
10.
|
|
Image from Amazon.com
|
Networking basics by
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York Wiley 2013
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):71 Q3 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
11.
|
|
Image from Amazon.com
|
|
|
|
12.
|
|
Image from Amazon.com
|
REID security:techniques, protocols and system-on-chip design by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York Springer 2008
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P8 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
13.
|
|
Image from Amazon.com
|
Security Protocols XXIV by
Material type: Text; Format:
print
Language: English
Publication details: Springer ; Springer ; 2017
Availability: Items available for loan: Central Library (1).
star rating
Average : 0.0 out of 5 stars
|
|
|
14.
|
|
Image from Amazon.com
|
Security Protocols XXV by
Material type: Text; Format:
print
Language: English
Publication details: Springer ; Springer ; 2017
Availability: Items available for loan: Central Library (1).
star rating
Average : 0.0 out of 5 stars
|
|
|
15.
|
|
Image from Amazon.com
|
Security Protocols XXVI by
Material type: Text; Format:
print
Language: English
Publication details: Springer ; Springer ; 2018
Availability: Items available for loan: Central Library (1).
star rating
Average : 0.0 out of 5 stars
|
|
|
16.
|
|
Image from Amazon.com
|
Security Protocols XXVII by
Material type: Text; Format:
print
Language: English
Publication details: Springer ; Springer ; 2020
Availability: Items available for loan: Central Library (1).
star rating
Average : 0.0 out of 5 stars
|
|
|
17.
|
|
Image from Amazon.com
|
Symmetric cryptographic protocols by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York Springer 2014
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q4 TD.
star rating
Average : 0.0 out of 5 stars
|
|
|
18.
|
|
Image from Amazon.com
|
|
|
|
19.
|
|
Image from Amazon.com
|
|